Term
What is penetration testing ? |
|
Definition
Penetration testing is a part of Ethical Hacking, Finding vulnerabilities or risks and mitigating them to secure a computer or network system. |
|
|
Term
|
Definition
Extracting information such as usernames, computer names, network resources, shares, and services. |
|
|
Term
What does it mean when hackers "gain access"? |
|
Definition
When hacker takes information found through reconnaissance and scanning and exploits the vulnerabilities. |
|
|
Term
|
Definition
A white box test is the opposite of a black box. The ethical hacker is given full knowledge of the network, computer systems, and infrastructure.A white box test is the opposite of a black box. The ethical hacker is given full knowledge of the network, computer systems, and infrastructure. |
|
|
Term
What are the ethical hacking methodology? |
|
Definition
Phase Description Performing reconnaissance In this phase, the hacker begins gathering information about the target. This can include gathering publicly available information, using social engineering techniques, or even dumpster diving. Scanning and enumeration Scanning is a natural extension of reconnaissance. The hacker uses various tools to gather in-depth information about the network, computer systems, live systems, open ports, and other features. Extracting information such as usernames, computer names, network resources, shares, and services is known as enumeration. Enumeration is a part of the scanning step. Establishing access In this phase, the hacker uses all the information gathered through reconnaissance and scanning to exploit any vulnerabilities found and gain access. Maintaining access Once the hacker has gained access, he can use backdoors, rootkits, or Trojans to establish permanent access to the system. Clearing tracks The final step in the hacking process is clearing tracks. The hacker overwrites log files to hide the fact they were ever there. |
|
|